JADE Mobile Agent Self-Protection
- Downloads:
- Views:
- Rating:

Security is a subject of major concern in mobile agents. This project provides a security framework that allows the protection of mobile agents from third parties. A self-protected approach, where the agents themselves manage the process, is used.
JADE Mobile Agent Self-Protection License - GNU Library or Lesser General Public License (LGPL)
Free download from Shareware Connection - Security is a subject of major concern in mobile agents.
Version: 1.0 | Platform: WinOther
Released Date: | Rating: 0 | Title: JADE Mobile Agent Self-Protection
Author Url: http://jmasp.sourceforge.net
Program Info Url: http://jmasp.sourceforge.net
Download Url: http://jmasp.sourceforge.net
GENOM 2005
xyExtract Graph Digitizer
The GD&T Trainer: Professional Edition
GG-Tracker GPS and GSM Tracking
BrainStimPro Binaural Generator
Rimu PCB
CHEMIX School
XTerm Medical Dictionary
AMSES Frame2D
Physics 101 SE
LAB Fit Curve Fitting Software
EarthWatch
Periodic Table Flash Cards
DigitizeIt
Jacada Mobile Agent - Jacada Mobile Agent (JMA) simplifies and accelerates customer service to users of smart phones and mobile devices by providing visual IVR self service flows that result in a substantially reduced number of calls to the call center. This ...
Mobile Agent Framework - MAF (Mobile Agent Framework) is a research prototype which aims to facilitate the development and evaluation of mobile agent by providing a set of handy primitatives and simulation tools.
Trinity mobile agent framework - Trinity is mobile agent framework for creation of wide range of mobile agent types. Main goal of project is to provide a tool for rapid development of non-complex agents. Trinity is implemented in .NET v3.
MASMA - Mobile Agent System - Mobile Agent System.
Bradford Mobile Agent - Bradford Mobile Agent is an application that works with Bradford's Network Sentry™ platform to secure and register mobile devices on enterprise networks. Network Sentry™ provides IT organizations with centralized management, visibility and ...
Shareware Connection periodically updates pricing and software information of 'JADE Mobile Agent Self-Protection' from company source 'Jmasp' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'JADE Mobile Agent Self-Protection' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of JADE Mobile Agent Self-Protection.
PureSync Personal - When you use computers, there is no way you can escape using specialized third party software. These need to be used for various needs including office productivity, web access, taking back-up and ensuring proper synchronization across multiple ...
7-Data Recovery Suite Free Edition - When you are dealing with lots of data it may be necessary at times to recover deleted data. The data may be deleted by mistake or by someone else. In such instances, it becomes necessary to retrieve the deleted data. You need to use third party ...
360 Internet Security - Using a computer without having capable Security software installed is equivalent to sleeping with your house’s main door wide open. Whether you use a PC at home or manage a network of computers at the workplace, PC security suite has ...
PCFerret - For average PC users learning about the details of each hardware component used in the laptop or desktop may not be an easy task. It is something the geeks can find out easily. However, less tech savvy PC users can surely resort to specialized ...
Potatoshare Systemnanny - People use PCs for various needs nowadays. A computer is not used to run office productivity or accounting software alone anymore. It is also used for tasks like web browsing, media playback, file conversion, and myriad related needs. After ...
Quick Crypt - PC users have become more conscious and careful about privacy of their data these days, especially about the data they need to share with others. There are valid reasons for this trend. Instances of personal information theft and attacking are on ...
Portable SMPlayer - Using media player software is something PC users are not alien to, as it is. Even the most workaholic users indulge in listening to music tracks at times. While the WMP, which comes with Windows, may serve needs for some users, it is not ...
Google Drive - In last few years, the popularity and proliferation of Cloud storage and usage has shot up considerably. Everyone, including a teenager to a network administrator is using some type of cloud based data storage. You can opt for both free and paid ...
Emsisoft Emergency Kit - The way malware creators and hackers are adapting to newer measures to sneak past PC security, it is no longer enough to stay complacent after installing a standalone antivirus. You never know when a stealthy malware sneaks past its scan and ...
Norton Power Eraser - Getting rid of malware and other types of rogue applicationlications with a regular antivirus can prove to be a tough task nowadays. The way malicious users are becoming smarter with time; it makes sense to use an additional layer of protection ...


